Nobody is perfect.
World is digitalized.
We are “System
At least we are “users”
Sniffer:computer software or computer
hardware that can intercept and log traffic
passing over a network or part of a network.
Depending on the network structure (hub or
Is a situation in which one person or program
successfully masquerades as another by
falsifying data and thereby gaining an
“URL spoofing and phishing,Dns spoofing,Arp
spoofing,MITM,E-mail address spoofing,Ip
Describes e-mail activity in which the sender
address and other parts of the e-mail header
are altered to appear as though the e-mail
originated from a different source.
Is the art of making a DNS entry to point to an
another IP than it would be supposed to point
DNS Cache Poisoning.
DNS ID Spoofing.
Faking the ARP message.
Associates the attacker's MAC address with
the IP address of another machine.
Any traffic meant for that IP address would be
mistakenly sent to the attacker.
Attempting to acquire sensitive information
such as usernames, passwords and credit
card details by masquerading as a
often directs users to enter details at a fake
website whose look and feel are almost
identical to the legitimate one.
The creation of IP packets with a spoofed
source IP address with the purpose of
concealing the identity of another machine.
ifconfig eth0 down hw ether
Allows the bypassing of access control lists on
servers or routers,
Attack in which the attacker makes
independent connections with the victims and
relays messages between them, making them
believe that they are talking directly to each
Refers to the exploitation of a valid computer
session to gain unauthorized access to
information or services in a computer system.
Is an attempt to make a computer resource
unavailable to its intended users.
prevent an Internet site or service from
functioning efficiently or at all, temporarily or
saturating the target (victim) machine with
external communications requests, such that
it cannot respond to legitimate traffic.
Dos attacks (cont)
ICMP flood (Smurf attack”Reflected
attack”,Ping flood,Ping of death).
Prevented by (switches,routers,firewall,ips).
Is an anomaly where a process stores data in
a buffer outside the memory the programmer
set aside for it.
1-overflow an input field, command-line
argument, or input buffer.
2-overflow the current return address on the
stack with address of the exploit code loaded
in step 3.
3-write a simple set of code for the next space
in the stack that includes attacker commands.
Apiece of software, a chunk of data, or
sequence of commands that take advantage
of a bug, glitch or vulnerability in order to
cause unintended or unanticipated behavior
to occur on computer software, hardware, or
Is a code injection technique that exploits a
security vulnerability occurring in the
database layer of an application. The
vulnerability is present when user input is
either incorrectly filtered for string literal
“select * from `users` where `username` =
'$userName' and `password` = '$password'”
What if user has entered his username as:
' + 1 = 1.
Query where clause will be true, which will
authenticate user in.